external-dns :: 에버노트

ABOUT ME

-

Today
-
Yesterday
-
Total
-
  • external-dns
    카테고리 없음 2022. 6. 24. 15:55

    apiVersion: v1
    kind: ServiceAccount
    metadata:
      name: external-dns
      # If you're using Amazon EKS with IAM Roles for Service Accounts, specify the following annotation.
      # Otherwise, you may safely omit it.
      annotations:
        # Substitute your account ID and IAM service role name below.
    #  eks.amazonaws.com/role-arn: arn:aws:iam::124124124:role/eks--dns
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: external-dns
    rules:
    - apiGroups: [""]
      resources: ["services","endpoints","pods"]
      verbs: ["get","watch","list"]
    - apiGroups: ["extensions","networking.k8s.io"]
      resources: ["ingresses"]
      verbs: ["get","watch","list"]
    - apiGroups: [""]
      resources: ["nodes"]
      verbs: ["list","watch"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: external-dns-viewer
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: external-dns
    subjects:
    - kind: ServiceAccount
      name: external-dns
      namespace: default
    ---
    apiVersion: apps/v1
    kind: Deployment
    metadata:
      name: external-dns
    spec:
      strategy:
        type: Recreate
      selector:
        matchLabels:
          app: external-dns
      template:
        metadata:
          labels:
            app: external-dns
        spec:
          serviceAccountName: external-dns
          containers:
          - name: external-dns
            image: k8s.gcr.io/external-dns/external-dns:v0.10.2
            args:
            - --source=service
            - --source=ingress
            - --domain-filter=naver.com
            - --provider=aws
            - --policy=upsert-only
            - --aws-zone-type=public 
            - --registry=txt
            - --txt-owner-id=Z124

    댓글

Designed by Tistory.